Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 13:41
Static task
static1
Behavioral task
behavioral1
Sample
2289021e755e3313826ee3c8db43821d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2289021e755e3313826ee3c8db43821d.html
Resource
win10v2004-20231215-en
General
-
Target
2289021e755e3313826ee3c8db43821d.html
-
Size
7KB
-
MD5
2289021e755e3313826ee3c8db43821d
-
SHA1
c297bd6a68a8f8f37261bf1d27f12f0c54393f9d
-
SHA256
e522b9f9fe16391046cdf2b3c87dffd6cb9b668e6d2a7f301727f16f3d861e52
-
SHA512
16f3093aa2e2d057e60ed3551d71df706af12bfa4d8a1ef5cdc9feb09a33c3ced85d5cb8eb132e688c3e1943db1988fbae07310f38fafa9a8d469c2b25fe9af9
-
SSDEEP
96:uzVs+ux7wg0LLY1k9o84d12ef7CSTUJzfOY9T6G7IrcEZ7ru7f:csz7wg0AYS/UtOb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409734646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87CA8DA1-A3B9-11EE-94C2-56B3956C75C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501edc5dc637da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000031fcd47188db8c4ced099325565b82f353268be76ab9a0803c2bed5ead02175b000000000e80000000020000200000002f1cbbf5e06c493017ea7e8681ba747460b45d2d12c21dcaf97ebdff43f2231f200000007c9342d1ee3822909ce1f8cd668c1d70ce6d3457fba74f02f2eaebf803535acc400000006aeace3f07706acf1b891bd3a90a56526a26ad02d7bf78bc2fb931c6cd01ec66734a6c2c57fe4b468ffb1b8ed021362108bc30ace5c5246a96934f19b59288f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1404 2980 iexplore.exe 28 PID 2980 wrote to memory of 1404 2980 iexplore.exe 28 PID 2980 wrote to memory of 1404 2980 iexplore.exe 28 PID 2980 wrote to memory of 1404 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2289021e755e3313826ee3c8db43821d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508229239cd49b46855c26caec8367c02
SHA17d57708ad3fba0a57f1e1bb3d7092e4939d5950e
SHA2561f6be14a92cfa1026a62c842fd5d4f5a0c00723f8278339c8bfdc6496b275492
SHA51289ab26d35b6097a04a6d00503f4cd6dcd31d35d4851129e2bbd1ecaea5764fa5b46b36bef9e18982dbc3a6038f6f3d005527bee78a8a2b0e84ae084fbc87d35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c749672c56e21aa2997aa2c7df16184d
SHA14ef9a8f3d92bf9080a94873c209a3963cccc43f2
SHA256d0ffd6b77fd6fffa3835a0f00f279238d2cb38693e171407356e61e1bc99b148
SHA512be5ef1175765f5e4bdbf13964e34ddc943e73edce39125e5dc43c5f099c64f22a76158662cd50c115d9e3fbfed31b1135016b1a6c976536d7f610a31663740fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baded337a315dc2b143c25c6ea14b73a
SHA1b31b35906c98b8818c7db0648e9ed67bf0a0093c
SHA256eae6f1fb8443744793987ce69de6bdfdb415262e73c39efe3e9c9cbff2a07c11
SHA5124b1196170323dc30c7485c2ba4fcfbf9d3734308d047c9449218d45e8e7b5b1b9a35eebce89a02a7fa3d55b016a719aa9c52490b1897c48cf18e07fb247ede07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520977e2401b996efe25a09803852ce6e
SHA1f55b40cb9aa777db7d9531857eeadc5ab3266712
SHA2561d08325ceb439c2397800999f2fb6da08bffa0513025e2e6b88cdfad14fd6bd1
SHA5124391fb0bc84df6611ce5dcb92d10774dd9e41aef8ade693741fce4a5038c7cdf8ecf9551eabd4512df8517f1cb480f09a785cf5a0d5ce91a4ebee1f276fe1dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dac6c188fb947d18d539ad9168cdbe9
SHA12a4652b2139b3add3fe30986e3fe7a3e85530281
SHA256add5047291843c2f0df2d6c6cf4c2bb8c46bc90becbb974bc977a5ad23d25698
SHA512dcbd3705076b2ca11ea026428189a9cda54d1bb6b0097ebccfbddfa17379a80afc75cc827f27a5fe3bd45ce0a541c8f565fbf6d3e7395fd06731abbafafbf651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599566fb9754fa52507df5662fceb6c21
SHA1731325dcd0e5390f1cfb1f772861d8095173f8c2
SHA25664249dcf77c95ef21c2f855ee59158c455fe200b25489d4d9daec79a24f20444
SHA512e588b0ea5629f65421e570b24bef1b125574d75eaa85839c7d2a39e1fb04cd8584e9b18165132b70b87cd2f8bee9170b9aacdfefa8703fe5f0cd6f80072344cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13d1d8ef103744565cf1459a0088d6d
SHA1ac0c073fecc96d1430cfdb406809e865196ae2e8
SHA25673947cc611ba0beac13a409657edf5f2989337ef2c6d54394dcb2147f3b429ec
SHA512a68f23f1196b3d17c0891eb9fcf171741b9daa55006eeec151f00c02afb821bd8eab29806b3afa127428bd06054d2c0d37ccb24925daa588c0ef4f5e4f7b1342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b8724ae3a9a9dadb2e599c9715e1fb
SHA1bdb1229d082ef23ef4351b812e6d3f8a6df6b8dd
SHA256469aaead5deb823c32f51483a018924030772da5e2b1b0ea9aa44c8c22ee774a
SHA5121b81909557e2466590e688c7623a27b6c184a3f08c13bd46cd065ed482d4d26e1f8360f38edcd94d5b1752e243890cd21ede0b8f3597c532171f7e541477a615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86d5385a70bdbd526ba1fe7c9c29a80
SHA1c5ffdd44ebf68cb7471e8e2b6c7f172a24da73c9
SHA256840ee3d1fb52080515de77ab8ca6beae2df02d1ff960b644890e58d6ac935401
SHA5122323da4349a35d11a269f9c95a2309c0cccf0f8601462a698aeea010cbfcda14118130870e394caebaafd6477b78a1707473e5b4ac6a7147cd5109b243f8f2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546389061800d246ab52d465cc8e1383c
SHA17735c159c5edb0570e10c10d463505827c3647ab
SHA256de85a87102f9fad59319f8323595c72f75463762f925eba18d6c6b9313bf0a95
SHA512d4afdea4ead65fc097c69b5444869a859c6cd6d36ead2b0ff0a1cfd7676d5ac3b7a3716c90fb50713bdc1627f11b30143227045515bb0c167b00042140bcc603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab65d5d3ee0b06797e3a316a50b9cb19
SHA1b0a17466319c7d91844f1508fe361e3e322daea8
SHA2562c8be094fdfe0ed11c98fe1950e4bea20a08824306a07cef66af1b1c9840840b
SHA51233407fd0a2f7d0a6e7d2da104fd3ad192b48363e1caedeb5bd8b5505c323f2a0b7a044e7ebb62a40b7a8e95bf7ccda81ec6280737c79c39e2eeb57547a71e269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e713547d48b7cd61e1fb055162d855
SHA11d3624657b2ac8f5b6bdbb11ab12ad0db93b2124
SHA2561042e24df98971bcaf7e5c7f4f3274d901a8899e9414def4244b43a6f3b200f7
SHA5126083e118071855311330d0a630071b540003aa93fa967b851322641afd39e9ee8e839cda038f84d935d8ca21ecd9422e50ace2615370cf948d4437bc1290a1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abeda5fc7304c69ca6481e9fc6c371ae
SHA1dfad2a49d87350ddb7327b3140d7f9d660ea9c78
SHA256369553653e88b6a4a7aecc38a8b9f19de8a7893ca59743422d89d5ddcc67c4e1
SHA512171af1c0c0fc62335ccd28bbcd99cdeb0889172dd5847237ee6b3d01a811395527d3e9c4703747165379c4590c9eb17422458438541317d98cbf989d1f7e3bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc9c44626b19110eeea858fdbe7f075
SHA13d49b0c33f4b4017ef5fba36bd335378960772bc
SHA256806325fdb184d3f70fdcb4a4922a9f9b238baa5b441165da5128f459e6f03665
SHA512a7a6b9658b6d299ffac1ce76834740245cc2ccbd57318d5ce41f607905ce07779cf40a5e527d617a18a9df8c09128d0bef2cfa966ae4857f3ed73d0afbcbece5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900375c552979c5dfb1f55e1dfa418df
SHA1433de893763d37509165627babf244a13b06766e
SHA25655471ca3a6a1b8e525f88ade2269f15dcda859c1bddc6a282f36f678895182a1
SHA512f27effeb15045c36bab4e79b9d5cb3292be6d0f4d09ea40af09b3c51359d9643bb1ffdb22cd92ca892980689d2d6d008cabb8d220e392fe225fef335d0d5706d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19811c6a363f607dc320c3d5c9eed81
SHA182c24f0d48f54bb7e029b5d878d8b53af7efcb3e
SHA256efb6547e6ff1a5d1b86c6f04b4ef1b1c1af6e0d48a5d552c7adfc7ad20afdda4
SHA512cf2d25f82eac863325f02f606d11a320b5585d1fb921e6aefd8554e248fab2e362e5bd4621ff49323b8ade6b3dd6d78c2fbe23aa2efc8948c7319e8d4988bf91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bcb168466b48a96162b7815b0195cb6
SHA111e673dab17c3267085db1f204200b651348e04a
SHA256dd816394c7d2ef8e99a45a220b88a66f466c0d1ab6eca1c12d066494ffc0374d
SHA5124b2d5e845f7323feaf760a1ce7efdcd24d03998e80a0606205a671bf8f436f784634550a6e7cda24b73f57c26c9998175b603f60e4b9c8cdc94c8284899563d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac09753275fdb144f12a97e1fbf616c5
SHA12c1c6e5e3b798989fdefab0f1a2256b2aab2335f
SHA2568c65b06205475bcc4b01b0ba833bb215d8e9df30e9bdaff912f47f7b9b72cecb
SHA51235de4273153c05d47708278b77116bd76093938936af3acf9f42c1337ece9772da3a1f0ba967b00e5b328ea09f21575d7ba7d39f5001a1c2f55e34b67088f19b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06